GSoC 2026
OWASP Foundation

OWASP Foundation — Project Ideas

GSoC 2026 Ideas

Bug Logging Tool (BLT)OWASP DevSecOps Maturity ModelOWASP NettackerOWASP NestOWASP Juice ShopPygoatOpenCREOWASP OWTFOWASP Cornucopia

Tips to get you started in no particular order:

List of Project Ideas

Bug Logging Tool (BLT)

OWASP BLT (Bug Logging Tool) is a community-driven OWASP Foundation project that develops and maintains open-source tools for structured vulnerability reporting, bug tracking, security automation, contributor engagement, and related infrastructure. The BLT ecosystem includes modular services, APIs, dashboards, browser and mobile applications, automation bots, and research initiatives, all developed transparently under OWASP governance and open-source licensing.

BLT has evolved into a growing ecosystem that combines modern full-stack engineering, AI-assisted security workflows, hands-on security education, distributed scanning infrastructure, and blockchain-backed incentive systems. The platform functions both as a production-grade vulnerability management system and as a practical learning environment where contributors build real-world security expertise.

This year’s GSoC projects center on core platform modernization, AI-native interfaces, automation-first workflows, distributed security infrastructure, hands-on security education, and meaningful gamification. Our goal is to make BLT faster, more scalable, AI-agent ready, and deeply educational—turning real security work into structured learning pathways.

Preference will be given to students who have at least

5 merged PRsbefore GSoC selection.

🔹 2026 GSoC Ideas / All Large Projects

BLT-Next : Core BLT Migration to GitHub Pages and Cloudflare Python workers

Revamp BLT website with a fresh, modern design by removing non-core components to create a clear, enjoyable user experience focused on core value. The project involves migrating the complete OWASP BLT platform from its current Django-based monolithic architecture to a lightweight static frontend deployed on GitHub Pages using plain HTML, vanilla JavaScript, and HTMX, with dynamic functionality powered by Cloudflare Python Workers at the edge. This migration will replace Django template rendering with modular static components and progressive enhancement, achieving sub-200ms global response times, simplified architecture, improved maintainability, and production-grade reliability while preserving full feature parity and positioning BLT as a fast, contributor-friendly reference implementation.

BLT-Preflight : Pre-Contribution Security Intent & Risk Guidance

Provide security intent and risk guidance before contributors submit code to prevent common mistakes and improve contributor understanding. This pre-contribution advisory system helps contributors understand security expectations before opening a pull request by evaluating security context through issue labels, repository metadata, and historical patterns, then providing plain-language guidance linked to relevant documentation. The system includes optional contributor intent capture (planned work areas, components to modify, AI assistance usage), a maintainer visibility dashboard for early identification of risky contributions, and a learning feedback loop that refines guidance rules over time. BLT-Preflight operates on a purely advisory basis with no blocking or enforcement mechanisms, focusing on prevention and clarity to reduce maintainer workload and improve the quality of security contributions.

BLT-Rewards : BACON Rewards & Security Contribution Gamification

Security contribution gamification with BACON tokens, badges, reputation tiers, and leaderboards to increase contributor retention and engagement. The system listens for verified security contributions and awards rewards idempotently including BACON cryptocurrency tokens (with existing blockchain mint infrastructure), achievement badges for different security domains, progressive reputation tiers (Beginner → Expert), severity-weighted leaderboards, and a swag redemption marketplace where tokens convert to physical merchandise. Built with robust anti-gaming architecture (idempotent rewards, fraud detection, admin oversight), the platform includes comprehensive audit trails, an education bridge API layer for learning platform integration, and tokenomics analysis to ensure long-term sustainability. BLT-Rewards transforms security work into an engaging, progression-based experience that prioritizes impact over volume while enabling education platforms to leverage BLT contribution data for personalized learning paths.

BLT-NetGuardian : Distributed Autonomous Security Scanning Platform

Community-powered security scanning platform with distributed scanning, real vulnerability detection, and responsible disclosure workflows. NetGuardian replaces stubbed scanners with real vulnerability detection (XSS, SQLi, CSRF, security headers plus Semgrep SAST), introduces distributed scanning via secure volunteer CLI clients with local resource caps, and implements Zero-Trust encrypted ingestion where sensitive evidence stays encrypted end-to-end until authorized organization users decrypt it client-side. The platform includes result validation and false-positive filtering with confidence scoring, basic deduplication using fingerprints, triage-lite UI with evidence viewer and “Convert to Issue” workflow, security.txt detection for improved responsible disclosure, and professional remediation reports (CSV/PDF) for organizations. NetGuardian emphasizes accuracy through curated evaluation targets and rule tuning, privacy-preserving architecture with signed and timestamped submissions, and lower reviewer workload through normalized findings and streamlined triage.

BLT University : Security-Focused Education Platform

Security-focused education tool that teaches users about security through hands-on, code-centric labs and community-driven knowledge sharing. The platform transforms BLT’s existing theory-heavy labs into interactive exercises where learners analyze real vulnerable code, identify security flaws, explain exploitation scenarios, and apply secure fixes using a three-step workflow (Identify → Explain → Fix) with partial credit and progress tracking. BLT University establishes a safe, anonymized security intelligence pipeline that aggregates vulnerability patterns from BLT issues/PRs into public dashboards, monthly/quarterly reports with two-person approval workflows, and remediation playbooks that convert into mini interactive challenges. The unified architecture creates a feedback loop where real vulnerability patterns improve labs and playbooks, helping contributors learn security thinking inspired by OWASP Top 10 and CTF-style reasoning, with optional integration to badges/BACON gamification and future connections to NetGuardian findings for automatically mapped learning recommendations.

BLT-MCP : Model Context Protocol Server for Complete BLT Interface

An interface to the BLT ecosystem enabling AI agents and developers to log bugs, triage issues, query data, and manage workflows from IDEs or chat interfaces. BLT-MCP implements the Model Context Protocol (MCP) standard to provide comprehensive, AI-agent-friendly access to all aspects of BLT through three layers: Resources (read-only access to issues, repos, contributors, workflows, leaderboards, rewards via blt://

URIs), Tools (actions like submit_issue, award_bacon, update_issue_status, add_comment), and Prompts (reusable task templates like triage_vulnerability, plan_remediation, review_contribution). The system uses JSON-RPC 2.0 over stdio or HTTP/SSE with OAuth 2.0/API key authentication, enabling natural integration with Claude Desktop, custom AI agents, and third-party tools without requiring custom API documentation since agents discover capabilities automatically. BLT-MCP positions BLT as an AI-agent-first platform with standardized protocol access that unifies fragmented REST/GraphQL endpoints, creates novel use cases (autonomous issue triage, automated reward distribution, workflow tracking), and synergizes with other BLT ideas by exposing RAG bot capabilities, AI-guided recommendations, reputation scores, and gamification data through a single consistent interface.

Expected Results

  • Successfully implementing a fully functional, production-readyfeature. - Contributions must align with BLT’s core security and performance goals. - Code should adhere to best practices, including security testing, CI/CD integration, and documentation.

📌 Knowledge Prerequisites

To contribute effectively, familiarity with at least one or more of the following is recommended:

**Back-End:Python, Django, Django Ninja, SQLFront-End:HTMX, Tailwind CSS, HTML/CSSBlockchain:Bitcoin Ordinals, Solana, Smart ContractsAI/ML:NLP, Machine Learning for security analyticsDevOps & Security:**GitHub API, REST API, OAuth, Authentication

👥 Mentors

📌 Confirmed Mentors: (we’re all on the OWASP Slack in the #project-blt channel)

Donnie BrownAhmed ElSheikhManikandan ChandranRinkit AdhanaRaj GuptaVinamra VaswaniCarla VoorheesJigyasu RajputRishab Kumar Jha****Akshay Behl

OWASP DevSecOps Maturity Model

Join us in enhancing the DSOMM, a pivotal tool designed to improve the security and operational efficiency of software development processes. We are looking for passionate students to contribute to two major areas: our main application development in JavaScript and our metric analyzer and collector in Java. Whether you are looking to tackle medium-sized challenges or are ready to embark on a larger project, we have exciting opportunities for you.

To receive early feedback please:

  • put your proposal on Google Docs and submit it to the OWASP Organization on Google’s GSoC page in “Draft Shared” mode.
  • Please pick “dsomm” as Proposal Tag to make them easier to find for us. Thank you!
Update of the DSOMM Application (Angular)

Primary Objectives:

  • Upgrade Angular Framework: Migrate the DSOMM application from its current Angular version to Angular 21
  • Updates: Update all related dependencies including TypeScript, RxJS, Angular CLI, and third-party libraries
  • Code Modernization: Refactor deprecated APIs and adopt modern Angular patterns (standalone components, signals, etc.)
  • Testing & Quality Assurance: Ensure all existing functionality works correctly after migration with comprehensive testing, this can lead to unit test optimization
  • Documentation: Update developer documentation with new setup instructions and migration notes

Prerequisites

  • Proficiency in the corresponding programming language (JavaScript and Angular for the main application)
  • Previous contributions to open-source projects are highly desirable, demonstrating your commitment and collaborative skills
Mentors

Reach out to us on Slack to discuss these and other ideas!

OWASP Nettacker

OWASP Nettacker is a Modular Automated Penetration Testing/ Information gathering Framework and Vulnerability Scanner fully written in Python. Nettacker can run a variety of scans discovering subdomains, open ports, services, vulnerabilities, misconfigurations, default credentials.

Explanation of Ideas
  • improve/redesign WebUI / add a dashboard
  • implement more tests, get 85% code coverage level
  • implement more modules, focus on more coverage of CISA KEV CVEs
  • implement external API keys configuration using a config file, API and WebUI
  • implement module workflows e.g. run module B after module A only if module A returns any result/result matching condition
  • improve documentation
  • improve scan engine efficiency
Your Own Ideas

Do you have an idea to improve OWASP Nettacker? We’d love to hear it, please reach out in OWASP Slack on channel #project-nettacker to ensure that the idea fits OWASP Nettacker roadmap and goals.

Getting Started

Repositories:

OWASP Nettacker on OWASP GitHubDocumentation- Join OWASP Slack and contact us on channel #project-nettacker

Knowldege Requirements
  • Python
  • Flask
  • HTML/CSS/JavaScript
  • previous vulnerability scanning/bug bounty hunting experience, vulnerability scanning tools use (nmap, metasploit, other kali linux tools)
Mentors

OWASP Nest

OWASP Nest is a comprehensive, community-first platform built to enhance collaboration and contribution across the OWASP community. Acting as a central hub, it helps users discover chapters and projects, find contribution opportunities, and connect with like-minded individuals based on their interests and expertise.

Repositories

OWASP Nest BackendOWASP Nest FrontendOWASP Nest SchemaAPI SDK GoAPI SDK PythonAPI SDK TypeScript

Technical Stack

  • Python, Django, Pytest, Strawberry, Ninja
  • TypeScript, React, Apollo, Next.js. Jest, PlayWright
  • Hero UI, Tailwind CSS
  • PostgreSQL, Algolia, Redis
  • Docker, Ansible, Terraform, AWS

Getting Started

from OWASP Nestissues page

Projects / Ideas

OWASP Board Activity Standardization and Data Programmatic Access: This milestone focuses on standardizing how OWASP Board activities are recorded, structured, and published. - OWASP Board Candidate Information Transparency and Fact-Checking: This milestone focuses on improving the transparency, accuracy, and trustworthiness of information related to OWASP board candidates. - OWASP Community Snapshots: Creating a summary of activities within OWASP projects, chapters, and events, including new blog posts and news, to keep the community informed about recent developments. - OWASP Contributor Recognition Program: This milestone introduces an OWASP-wide Contributor Recognition system in OWASP Nest to make contributions visible, measurable, and shareable across projects and chapters, inspired by community platforms like ContribCard, with potential integration into existing OWASP Nest badges and certificate delivery via services like Certifier. - OWASP NestBot AI Assistant Improvement: Develop an AI-powered OWASP NestBot Slack assistant that acts as an auto-responder for frequently asked questions, guides users to the appropriate OWASP channels, and handles typical OWASP community queries. - OWASP Nest Monitoring and Observability: Implement modern monitoring and observability practices across OWASP Nest infrastructure on AWS to ensure reliability, performance visibility, and proactive issue detection. - OWASP Nest UI/UX Revamp: This milestone delivers a comprehensive UI/UX revamp of OWASP Nest to improve usability, accessibility, visual consistency, and the overall contributor experience across the platform. - OWASP Pulse: This milestone introduces the OWASP Pulse page in OWASP Nest as a unified, near real-time activity feed that aggregates events across repositories with filters by user, project, repository, and chapter to improve visibility and engagement.

Please visit our planned milestones page or gsoc2026

labeled issues page.

Your own ideas

Do you have an idea to improve OWASP Nest? We’d love to hear it, please reach out in Slack to ensure that the idea fits OWASP Nest goals.

Expected Results

  • Your proposal projects/ideas are fully completed.
  • Your code follows our existing style guides and passes quality checks, test coverage, etc.

Mentors

Please contact Arkadii Yakovets or Kate Golovanova if you’re interested in participating as a mentor.

OWASP Juice Shop

OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools! Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications!

To receive early feedback please:

  • put your proposal on Google Docs and submit it to the OWASP Organization on Google’s GSoC page in “Draft Shared” mode.
  • Please pick “juice shop” as Proposal Tag to make them easier to find for us. Thank you!

🛑 Please be aware that the OWASP Juice Shop project will

notconsider or even review any proposals which fail to include an AI Tool Disclosure statement. We recommend you use the following templated that we derived from the one enforced on Pull Requests to OWASP Juice Shop:### AI Tool Disclosure - [ ] My GSoC proposal does not include any AI-generated content - [ ] My GSoC proposal includes AI-generated content, as disclosed below: - AI Tools: [e.g. GitHub CoPilot, ChatGPT, JetBrains Junie etc.]- LLMs and versions:[e.g. GPT-4.1, Claude Haiku 4.5, Gemini 2.5 Pro etc.]- Prompts:[Summarize the key prompts or instructions given to the AI tools]``

Explanation of Ideas
Your own idea

You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!

Expected Results
  • A new feature or improvement of an existing one that makes OWASP Juice Shop even better
  • Your code follows our existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.
  • Code that you write comes with automated tests that fit into our available test suites.
Getting started
  • Make sure your JavaScript/TypeScript is sufficient to work on the Juice Shop codebase. Check our Codebase 101here. Students with some experience with (or willingness to learn) Angular and Node.js/Express are usually prefered. - Read our Contribution Guidelinesvery carefully. Best make some small contributions before GSoC, so we can see how you work and help you dive into the code even better. - Get in touch via Slackor email (see below) to discuss any of the listed or your own idea for GSoC!
Mentors

Bjoern Kimminich- OWASP Juice Shop Project Leader (bkimminichon Slack)Jannik Hollenbach- OWASP Juice Shop Project Leader (Jannikon Slack)

PyGoat

PyGoat is an open-source, intentionally vulnerable Python web application designed to help developers and security enthusiasts learn about web application security. It provides hands-on experience in identifying and mitigating common security vulnerabilities, making it a valuable resource for practicing secure coding and penetration testing techniques.

Repository

Skills Required

  • HTML/CSS/JavaScript
  • Python
  • Django
  • Docker
  • Basic knowledge of application security
Getting started

Projects / Ideas

  • Refactor the webapp, move away vulnarable labs from the main website.
  • Deploy a microservice architecture based approch for the labs.
  • Add new labs to the project.
  • Add interactive dashboard for user performance and completion status.
  • UI consistency
  • Expand challenge section and playgrounds.
  • Extend labs to other languages as well.
  • Prepare for OWASP Top 10:2026

section

Mentors

ardiansyahRupak Biswas(Rupakon slack)Garvita Kataria(Slack)

OpenCRE

OpenCRE is the world’s largest Cybersecurity knowledge graph. It semantically links information between standards, knowledge bases and security tools. Also, it allows users to extend the graph themselves and contains a RAG chatbot implementation. OpenCRE is a great GSOC project if you’re looking to add “Data science/engineering”, “Knowledge Graph and AI” with a focus on Legal Tech and cybersecurity in your CV.

Repository

Skills Required

  • HTML/CSS/React-Typescript
  • Python
  • Flask
  • Docker
Getting started
  • Check the GitHub projectand the issues marked as eithergood first issue

,help wanted

orGSOC

  • Join OWASP Slackand contact us on channel #project-opencre

Projects / Ideas

🔹 OpenCRE Scraper & Indexer (Project OIE) - Module Projects

The OpenCRE Scraper & Indexer is an autonomous ETL pipeline that ingests OWASP security knowledge from various sources, filters noise, and links content to the OpenCRE knowledge graph. This project consists of four independent modules, each suitable for a GSoC project.

Important Requirements:

Contributor Eligibility: Applicants must haveat least 3 merged pull requeststo the OpenCRE repository before GSoC selection. This demonstrates familiarity with the codebase, contribution workflow, and project standards.Code of Conduct: All contributors must read and agree to follow theOpenCRE Code of Conduct. Violations will result in immediate project termination.Pre-Code Experiments: Each module requires completion of specific pre-code experiments before implementation begins. These experiments validate the approach and ensure technical feasibility.

For detailed architecture and requirements, see the RFC: The OpenCRE Scraper & Indexer.

🔸 Module A: Information Harvesting

Primary Objectives:

  • Build a GitHub Actions-based cron job that runs nightly at 02:00 UTC
  • Implement a config reader that parses a repos.yaml

file containing a list of high-value OWASP repositories (ASVS, WSTG, etc.) - Develop a diff fetcher that uses git log --since="24h"

to identify changes in the last 24 hours - Create a temporary storage system (Raw Change Bucket) to store raw diffs before processing

  • Handle GitHub API rate limits gracefully
  • Parse files to extract meaningful text changes (not raw diff syntax)

Technical Requirements:

Tech Stack: Python (requests, PyGithub), GitHub Actions (Cron)Pre-Code Experiment:- Manually inspect 10 random OWASP repositories to identify common junk files (package-lock.json, CNAME, _config.yml, etc.)

  • Create a regex exclusion list that eliminates 90% of noise without downloading files
  • Write a 10-line script to fetch only modified paragraphs from a large Markdown file using git diff, returning clean text (not raw diff syntax)

Expected Results:

  • A production-ready GitHub Action that runs nightly
  • Configurable repository list via YAML
  • Efficient diff extraction that filters out noise files
  • Comprehensive error handling and logging
  • Unit tests with >70% code coverage
  • Documentation for configuration and maintenance

Difficulty Characterization: This is a Medium difficulty project requiring:

  • Understanding of GitHub API and rate limiting
  • Git operations and diff parsing
  • YAML configuration parsing
  • GitHub Actions workflow development
  • Incremental crawling strategies
🔸 Module B: Noise/Relevance Filter

Primary Objectives:

  • Implement a two-stage filtering system: regex-based filtering followed by LLM-based relevance checking
  • Create regex filters to reject common noise files (*.css, lockfiles, tests/, etc.)
  • Integrate with managed LLM APIs (Gemini Flash or GPT-4o-mini) for semantic relevance checking
  • Design and tune prompts to accurately identify security knowledge vs. noise (formatting, linting, bureaucracy)
  • Build a knowledge queue system that routes relevant content to Module C

Technical Requirements:

Tech Stack: Python (langchain or raw API calls), Managed LLM APIs (Gemini Flash/GPT-4o-mini)Pre-Code Experiment:- Extract 100 real commit messages/diffs from OWASP repositories

  • Manually tag them in a spreadsheet: Relevant (Security Info) vs Noise (Typos, Admin, Formatting)
  • Run these 100 items through the proposed LLM prompt
  • Success Criteria: LLM must match manual tags >97% of the time

Expected Results:

  • A filtering pipeline that processes raw changes and outputs relevant security knowledge
  • Tuned LLM prompts with >97% accuracy on validation dataset
  • Cost-effective implementation using managed LLM APIs
  • Comprehensive logging of filtered vs. accepted content
  • Unit tests with >70% code coverage
  • Documentation of prompt engineering process and results

Difficulty Characterization: This is an Easy difficulty project suitable for:

  • Entry-level developers interested in prompt engineering
  • Developers comfortable with API integration
  • Those who enjoy iterative prompt tuning (“vibe coding”)
  • No advanced ML knowledge required
🔸 Module C: The Librarian (Smart Content Mapping)

Primary Objectives:

  • Implement a two-stage retrieval system: vector search (bi-encoder) followed by cross-encoder re-ranking
  • Set up vector search using pgvector to retrieve top 20 candidate CRE nodes
  • Integrate sentence-transformers library with ms-marco-MiniLM-L-6-v2 model for cross-encoder re-ranking
  • Handle the “Negation Problem” (e.g., “Do NOT use MD5” should map correctly)
  • Implement update detection logic to identify when content is an update to existing content
  • Add security gates to detect adversarial updates or contradictions to previous content
  • Set threshold-based routing: score > 0.8 links to CRE, score < 0.8 flags for human review

Technical Requirements:

Tech Stack: sentence-transformers (HuggingFace), pgvector, PythonPrerequisites: Understanding of Embeddings, Bi-Encoders vs Cross-Encoders, Vector SimilarityPre-Code Experiment:- Select 50 random ASVS requirements and strip metadata

  • Feed them into basic Vector Search (Cosine Similarity)
  • Check mapping accuracy to correct CRE nodes
  • Run through Cross-Encoder and compare results
  • Success Criteria: Cross-Encoder must show 20% accuracy improvement over Cosine Similarity, especially for “Negative” requirements

Expected Results:

  • Production-ready content mapping system with >80% accuracy on validation dataset
  • Vector search integration with pgvector
  • Cross-encoder re-ranking pipeline
  • Update detection and security gate implementation
  • Comprehensive evaluation metrics and logging
  • Unit tests with >70% code coverage
  • Documentation of model selection, tuning process, and accuracy metrics

Difficulty Characterization: This is a Hard difficulty project requiring:

  • Deep understanding of embeddings and semantic similarity
  • Experience with vector databases (pgvector)
  • Knowledge of bi-encoders vs cross-encoders
  • Ability to tune thresholds and evaluate model performance
  • Understanding of information retrieval concepts
  • Strong Python skills for ML/AI integration

Bonus/Pro-Mode: Implement Hybrid Search (Vector + Keyword/BM25) for exact keyword matching (e.g., CVE IDs).

🔸 Module D: Human-in-the-Loop (HITL) & Logging

Primary Objectives:

  • Build a simple admin UI for reviewing flagged content from Module C
  • Implement a fast review interface optimized for “Tinder-swipe” speed (keybind ‘y’ for yes, ‘n’ for no)
  • Create a logging system that appends corrections to JSONL files (stored in S3/MinIO)
  • Design the UI to allow review, approve/reject, and save corrections in under 3 seconds per item
  • Implement user authentication and authorization for maintainers
  • Build a dashboard showing review queue status and statistics

Technical Requirements:

Tech Stack: Flask/React, S3/MinIO for storagePre-Code Experiment:- Draw wireframe or build 10-line HTML prototype

  • Test: Can a user review, approve/reject, and save a correction in under 3 seconds per item?
  • Success Criteria: UI must require minimal clicks (ideally keyboard shortcuts)

Expected Results:

  • A production-ready admin UI for content review
  • Fast, keyboard-optimized review workflow
  • JSONL logging system integrated with S3/MinIO
  • User authentication and role-based access control
  • Review queue dashboard with statistics
  • Unit tests with >70% code coverage
  • Documentation for maintainers

Difficulty Characterization: This is an Easy difficulty project suitable for:

  • Junior developers or frontend contributors
  • Developers comfortable with standard CRUD web applications
  • Those interested in UX optimization
  • Full-stack developers (Flask + React)

Bonus/Pro-Mode: Implement “Loss Warehousing” to capture structured loss events (Input + Wrong Prediction + Correct Label) for future model retraining.

Mentors

For OpenCRE Scraper & Indexer (Project OIE) Module Projects (A, B, C, D):

OWTF

OWTF attempts to solve the “penetration testers are never given enough time to test properly” problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:

  • To improve security testing efficiency (i.e. test more in less time)
  • To improve security testing coverage (i.e. test more)
  • Gradually integrate the best tools
  • Unite the best tools and make them work together with the security tester
  • Remove or Reduce the need to babysit security tools during security assessments
  • Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.
  • Help penetration testers save time on report writing

Repository

Skills Required

  • Python
  • Tornado
  • Docker
  • React/React ecosystem for application frontend
  • Basic knowledge of application security, tools used in bug bounty style hunting
  • Some knowledge of how TLS works, man in the middle proxies, HTTP internals, etc.
Getting started

Please use the repositories’ issue tracker, GitHub discussions, and don’t forget to read the contributing guide. Join the community at #owtf on OWASP Slack and share your questions, project ideas.

To receive early feedback please:

  • put your proposal on Google Docs and submit it to the OWASP Organization on Google’s GSoC page in “Draft Shared” mode.
  • Please pick “owtf” as Proposal Tag to make them easier to find for us. Thank you!

Projects / Ideas

OWTF Modernization

OWTF has evolved over time, but parts of the codebase are outdated, have technical debt, and may not be optimized for newer Python versions or best practices. This project aims to modernize the OWTF codebase, ensuring long-term maintainability, security, and efficiency. Key Objectives

  • Fix Long-Standing Bugs & Improve Stability

  • Audit and resolve GitHub issues related to stability, crashes, and performance bottlenecks.

  • Enhance logging and error handling for better debugging.

  • Improve unit tests and CI/CD pipelines to catch regressions early.

  • Optimize Plugin Execution & Dependency Management

  • Upgrade outdated third-party security tools used in plugins.

  • Reduce dependency bloat by removing redundant libraries.

  • Use async execution where applicable for better performance.

Expected Outcomes

✔️ OWTF will be cleaner, faster, and easier to maintain.

✔️ The project will be future-proofed with up-to-date dependencies.

✔️ Stability and performance will be significantly improved.

MiTM proxy upgrade

OWTF’s proxy was written almost 10 years ago based on the Tornado Web Framework. It is in rough shape and needs a lot of improvement on the transaction recording, storing, and modification side. We want to make it as good as MiTM proxy.

Expected Outcomes

✔️ Modern mitm proxy that allows modificaiton of requests and responses on the fly

✔️ Better integration with the framework to record a variety of requests and responses.

✔️ Stability and performance.

Mentors

OWASP Cornucopia

Repository

Skills Required

  • HTML/CSS/JavaScript
  • Python
  • Docker
  • No security knowledge required
Getting started

Projects / Ideas

  • Ensure the OWASP Cornucopia converter can create print-ready proofs for print-on-demand jobs. See: Description. - Add the EoP Game to the card browser. See: Description. - Redesign for cornucopia.owasp.org. See: Description.

Related Pages

Command Palette

Search for a command to run...